Average Ratings 1 Rating

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Rapidly examine all escalated alerts with unmatched thoroughness and efficiency, transforming the approach of Security Operations and Incident Response teams towards the investigation of cyber threats. In our increasingly intricate and dynamic hybrid environment, it is essential to have a reliable investigation platform that consistently provides crucial insights. Cado Security equips teams with exceptional data acquisition capabilities, a wealth of contextual information, and remarkable speed. The Cado Platform streamlines the process by delivering automated, comprehensive data, which eliminates the need for teams to rush around in search of essential information, thereby facilitating quicker resolutions and enhancing collaborative efforts. Given the transient nature of certain data, prompt action is critical, and the Cado Platform stands out as the only solution that offers automated full forensic captures alongside immediate triage collection techniques, seamlessly acquiring data from cloud-based resources such as containers, SaaS applications, and on-premise endpoints. This enables teams to stay ahead in the face of ever-evolving cybersecurity challenges.

Description

THOR stands out as the most advanced and adaptable tool available for compromise assessments. When responding to incidents, teams frequently encounter a collection of compromised devices along with a larger array of potentially affected systems, making the manual examination of numerous forensic images a daunting task. With THOR, the process of forensic analysis is accelerated thanks to its impressive arsenal of over 12,000 meticulously crafted YARA signatures, 400 Sigma rules, a variety of anomaly detection protocols, and countless indicators of compromise (IOCs). This tool is designed to emphasize suspicious activities, alleviate the burden on analysts, and expedite the forensic examination process during critical moments when timely results are vital. By concentrating on areas often overlooked by traditional antivirus solutions, THOR employs an extensive signature library that encompasses a multitude of YARA and Sigma rules, IOCs, and checks for rootkits and anomalies, effectively addressing a wide range of threats. Furthermore, THOR not only identifies backdoors and tools leveraged by attackers but also captures outputs, temporary files, modifications to system configurations, and other remnants of nefarious actions, ensuring a thorough understanding of the incident landscape. The comprehensive nature of THOR makes it an invaluable asset in the realm of cybersecurity.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

AWS Fargate
Amazon EC2
Docker
Kubernetes
Mesh
Microsoft Azure
Red Hat OpenShift

Integrations

AWS Fargate
Amazon EC2
Docker
Kubernetes
Mesh
Microsoft Azure
Red Hat OpenShift

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Cado Security

Founded

2020

Country

United States

Website

www.cadosecurity.com/platform

Vendor Details

Company Name

Nextron Systems

Founded

2017

Country

Germany

Website

www.nextron-systems.com/thor/

Product Features

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Product Features

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Alternatives

Alternatives

ListSync Reviews

ListSync

ThorApps
Cyber Triage Reviews

Cyber Triage

Sleuth Kit Labs
ASGARD Management Center Reviews

ASGARD Management Center

Nextron Systems
Alisha AI SDR Reviews

Alisha AI SDR

floworks
Binalyze AIR Reviews

Binalyze AIR

Binalyze